Zero Trust 101: Start Your Journey Here
There’s more to securing your business than firewalls and VPNs. We live in a day when digital transformation is critical, and moving business to the cloud is both our present and our future. In the midst of this sea of change, it’s difficult to navigate through all the architecture complexities and industry jargon—particularly when it comes to diluted and misappropriated terms like zero trust. So, let’s keep it simple!...
June 25, 2025
Organizer:
Zscaler Location:
Webcast
The Strategy Behind Meeting CMMC Requirements
The purpose of the Cybersecurity Maturity Model Certification is to have in place the security and privacy controls that give information systems greater resilience in the face of a wide range of dangers, including malicious attacks, natural disasters, structural shortcomings, human error, and hostile nation-state surveillance. The catalog of controls is laid out in the National Institute of Standards and Technology Special Publication 800-53...
June 24, 2025
Organizer:
FedInsider Location:
Webcast
BeyondTrust's Securing Paths to Privile...
Registration is Closed Join BeyondTrust and your peers for a Lunch and Learn on June 12 from 12:30-2:30pm ET at Jackson's Bistro in Tampa, Florida. In this two-hour session, we’ll explore what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur. Topics we’ll cover:What modern id...
Unified Identity - The MVP for Unlockin...
In the drive for government transformation, Identity and Access Management (IAM) isn't just a supporting player—it's the MVP, the Minimum Viable Product–the critical starting point for achieving real impact. As federal agencies tackle IT enhancement, process streamlining, and workforce optimization, a robust identity strategy is the essential foundation. Identity is the first pillar of Zero Trust architecture and the key to unlocki...
BeyondTrust's Securing Paths to Privile...
Join BeyondTrust and your peers for a Lunch and Learn on June 10 from 12:30-2:30pm ET at the Ruth's Chris Steak House in Boston, MA. In this two-hour session, we’ll explore what it means to go beyond traditional privilege access management (PAM) to find, control, and protect hidden paths to privilege, minimizing your identity attack surface and overall impact if an attack does occur. Topics we’ll cover:What modern identity security...
EMERGE: Edge Forward
The edge is where the mission happens – on the battlefield, at disaster sites, in remote communities, and in environments where connectivity and resources are limited. As agencies across government face increasing demands to operate at the edge, they must overcome challenges in connectivity, data processing, and security to support critical operations. As technology evolves, the edge offers transformative opportunities to enable real-tim...
June 4, 2025
Organizer:
FedScoop Location:
Washington, DC
Federal Executive Forum Zero Trust Stra...
How far have agencies progressed in their zero trust journey, and how have strategies adapted to address emerging security challenges? Join this webinar to hear valuable insights from leading federal and industry cybersecurity experts.
ZenithLive 2025
Zenith Live is our flagship annual security event. This year, Zenith Live '25 brings you a full agenda packed with the latest innovations, best practices, customer stories, and thought leadership around zero trust, cloud security, digital transformation, securing AI, and more. Zenith Live sets the stage for engaging, thought-provoking sessions you won't find at any other cybersecurity event:Explore our newest technologies and insights with Zsc...
June 2-4, 2025
Organizer:
Zscaler Location:
Las Vegas, NV
CyberThreats 2025 - State & Local Requi...
State and local, territorial, and tribal governments are not bound by the federal agency mandate to implement zero trust architectures, but there are numerous reasons they are either considering it or taking action to put it in place. Zero trust is a particularly important concept for these smaller government bodies because they own and operate critical infrastructure and provide vital day-to-day services to their residents, from issuing drive...
May 29, 2025
Organizer:
FedInsider Location:
Webcast
CyberThreats 2025 - Beyond Zero Trust -...
The federal government has invested almost four years to move all its systems and networks to a least permissive access architecture, based on the concept of “never trust, always verify.” This has significantly improved cybersecurity, but it’s a moving target – bad actors, whether cyber criminals or hostile nation-states, keep evolving their tools and tactics, seeking new vectors they can penetrate. To constantly improv...
May 28, 2025
Organizer:
FedInsider Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.